[1] |
WANG H B , WANG J H , WANG J L ,et al. Squeezing the gap:an empirical study on DHCP performance in a large-scale wireless network[J]. IEEE/ACM Transactions on Networking, 2020,28(2): 832-845.
|
[2] |
AL-ANI A , ANBAR M , HASBULLAH I H ,et al. Authentication and privacy approach for DHCPv6[J]. IEEE Access, 2019,7: 73144-73156.
|
[3] |
CONTI M , DRAGONI N , LESYK V . A survey of man in the middle attacks[J]. IEEE Communications Surveys & Tutorials, 2016,18(3): 2027-2051.
|
[4] |
DROMS R . Authentication for DHCP messages[R]. RFC Editor, 2001.
|
[5] |
YOUNES O S . A secure DHCP protocol to mitigate LAN attacks[J]. Journal of Computer and Communications, 2016,4(1): 39-50.
|
[6] |
YOO K J , KIM E G . Design and implementation of DHCP supporting network attack prevention[J]. Journal of the Korea Institute of Information & Communication Engineering, 2016,20(4): 747-754.
|
[7] |
ZHANG F Q , CHEN L . OTP_SAM:DHCP security authentication model based on OTP[C]// 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design. Piscataway:IEEE Press, 2016: 346-350.
|
[8] |
DINU D D , TOGAN M . DHCP server authentication using digital certificates[C]// 2014 10th International Conference on Communications. Piscataway:IEEE Press, 2014: 1-6.
|
[9] |
TRIPATHI N , HUBBALLI N . A probabilistic anomaly detection scheme to detect DHCP starvation attacks[C]// 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems. Piscataway:IEEE Press, 2016: 1-6.
|
[10] |
CALVERT C , KHOSHGOFTAAR T M , NAJAFABADI M M ,et al. A procedure for collecting and labeling man-in-the-middle attack traffic[J]. International Journal of Reliability,Quality and Safety Engineering, 2017,24(1): 1750002.
|
[11] |
LV P , BAI L L , LIU T W ,et al. Detection of malicious domain names based on hidden Markov model[C]// 2018 IEEE Third International Conference on Data Science in Cyberspace. Piscataway:IEEE Press, 2018: 659-664.
|
[12] |
AGYEMANG J O , JERRY K , ACQUAH I . Lightweight man-in-the-middle (MITM) detection and defense algorithm for WiFi-enabled Internet of things (IoT) gateways[J]. Information Security and Computer Fraud, 2019,7(1): 1-6.
|
[13] |
OLANREWAJU R F , ISLAM T , KHALIFA O O ,et al. Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects[J]. Indonesian Journal of Electrical Engineering and Computer Science, 2018,10(1): 348-353.
|
[14] |
HUBBALLI N , TRIPATHI N . A closer look into DHCP starvation attack in wireless networks[J]. Computers & Security, 2017,65(3): 387-404.
|
[15] |
LIU Z , MOHIUDDIN G , ZHENG J ,et al. Privacy preserving IPv6 address DHCP configuration for Internet of things[J]. ACM Transactions on Information Systems, 2020,6(2): 595.
|
[16] |
LI L S , REN G , LIU Y ,et al. Secure DHCPv6 mechanism for DHCPv6 security and privacy protection[J]. Tsinghua Science and Technology, 2018,23(1): 13-21.
|
[17] |
TIAN Q , LIN Y , GUO X H ,et al. New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint[J]. IEEE Internet of Things Journal, 2019,6(5): 7980-7987.
|
[18] |
张艳硕, 王泽豪, 王志强 ,等. 基于特征值的可验证三方安全密钥交换协议[J]. 通信学报, 2019,40(12): 149-154.
|
|
ZHANG Y S , WANG Z H , WANG Z Q ,et al. Verifiable three-party secure key exchange protocol based on eigenvalue[J]. Journal on Communications, 2019,40(12): 149-154.
|
[19] |
杨亚涛, 韩新光, 黄洁润 ,等. 基于 RLWE 支持身份隐私保护的双向认证密钥协商协议[J]. 通信学报, 2019,40(11): 180-186.
|
|
YANG Y T , HAN X G , HUANG J R ,et al. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE[J]. Journal on Communications, 2019,40(11): 180-186.
|
[20] |
CARRé S , DESJARDINS M , FACON A ,et al. Exhaustive single bit fault analysis.A use case against Mbedtls and OpenSSL’s protection on ARM and Intel CPU[J]. Microprocessors and Microsystems, 2019,71: 1-13.
|
[21] |
LI Y , ZHU L , WANG H W ,et al. A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,22(4): 2286-2298.
|
[22] |
MALLOULI F , HELLAL A , SAEED N S ,et al. A survey on cryptography:comparative study between RSA vs ECC algorithms,and RSA vs el-gamal algorithms[C]// 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. Piscataway:IEEE Press, 2019: 173-176.
|